Even if there isn't a connector available yet for one of your security tools, you can still push vulnerabilities from any external system into Kenna using our simple, secure API.
The API is organized around REST to have predictable, resource-oriented URLs and to use HTTP response codes to indicate errors. We use HTTP verbs, which can be understood by off-the-shelf HTTP clients and libraries. The API utilizes JSON as the data exchange format.
For more information our RESTful API, please see: https://api.kennasecurity.com.